]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - t/t_openpam_dispatch.c
Vendor import of OpenPAM Resedacea.
[FreeBSD/FreeBSD.git] / t / t_openpam_dispatch.c
1 /*-
2  * Copyright (c) 2015-2017 Dag-Erling Smørgrav
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. The name of the author may not be used to endorse or promote
14  *    products derived from this software without specific prior written
15  *    permission.
16  *
17  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27  * SUCH DAMAGE.
28  *
29  * $OpenPAM: t_openpam_dispatch.c 938 2017-04-30 21:34:42Z des $
30  */
31
32 #ifdef HAVE_CONFIG_H
33 # include "config.h"
34 #endif
35
36 #include <err.h>
37 #include <stdint.h>
38 #include <stdio.h>
39 #include <stdlib.h>
40 #include <string.h>
41 #include <unistd.h>
42
43 #include <cryb/test.h>
44
45 #include <security/pam_appl.h>
46 #include <security/openpam.h>
47
48 #include "openpam_impl.h"
49 #include "t_pam_conv.h"
50
51 #define T_FUNC(n, d)                                                    \
52         static const char *t_ ## n ## _desc = d;                        \
53         static int t_ ## n ## _func(OPENPAM_UNUSED(char **desc),        \
54             OPENPAM_UNUSED(void *arg))
55
56 #define T(n)                                                            \
57         t_add_test(&t_ ## n ## _func, NULL, "%s", t_ ## n ## _desc)
58
59 const char *pam_return_so;
60
61 T_FUNC(empty_policy, "empty policy")
62 {
63         struct t_pam_conv_script script;
64         struct pam_conv pamc;
65         struct t_file *tf;
66         pam_handle_t *pamh;
67         int pam_err, ret;
68
69         memset(&script, 0, sizeof script);
70         pamc.conv = &t_pam_conv;
71         pamc.appdata_ptr = &script;
72         tf = t_fopen(NULL);
73         t_fprintf(tf, "# empty policy\n");
74         pam_err = pam_start(tf->name, "test", &pamc, &pamh);
75         if (pam_err != PAM_SUCCESS) {
76                 t_printv("pam_start() returned %d\n", pam_err);
77                 return (0);
78         }
79         /*
80          * Note: openpam_dispatch() currently returns PAM_SYSTEM_ERR when
81          * the chain is empty, it should possibly return PAM_SERVICE_ERR
82          * instead.
83          */
84         pam_err = pam_authenticate(pamh, 0);
85         t_printv("pam_authenticate() returned %d\n", pam_err);
86         ret = (pam_err == PAM_SYSTEM_ERR);
87         pam_err = pam_setcred(pamh, 0);
88         t_printv("pam_setcred() returned %d\n", pam_err);
89         ret &= (pam_err == PAM_SYSTEM_ERR);
90         pam_err = pam_acct_mgmt(pamh, 0);
91         t_printv("pam_acct_mgmt() returned %d\n", pam_err);
92         ret &= (pam_err == PAM_SYSTEM_ERR);
93         pam_err = pam_chauthtok(pamh, 0);
94         t_printv("pam_chauthtok() returned %d\n", pam_err);
95         ret &= (pam_err == PAM_SYSTEM_ERR);
96         pam_err = pam_open_session(pamh, 0);
97         t_printv("pam_open_session() returned %d\n", pam_err);
98         ret &= (pam_err == PAM_SYSTEM_ERR);
99         pam_err = pam_close_session(pamh, 0);
100         t_printv("pam_close_session() returned %d\n", pam_err);
101         ret &= (pam_err == PAM_SYSTEM_ERR);
102         pam_end(pamh, pam_err);
103         t_fclose(tf);
104         return (ret);
105 }
106
107 static struct t_pam_return_case {
108         int              facility;
109         int              primitive;
110         int              flags;
111         struct {
112                 int              ctlflag;
113                 int              modret;
114         } mod[2];
115         int              result;
116 } t_pam_return_cases[] = {
117         {
118                 PAM_AUTH, PAM_SM_AUTHENTICATE, 0,
119                 {
120                         { PAM_REQUIRED, PAM_SUCCESS },
121                         { PAM_REQUIRED, PAM_SUCCESS },
122                 },
123                 PAM_SUCCESS,
124         },
125 };
126
127 T_FUNC(mod_return, "module return value")
128 {
129         struct t_pam_return_case *tc;
130         struct t_pam_conv_script script;
131         struct pam_conv pamc;
132         struct t_file *tf;
133         pam_handle_t *pamh;
134         unsigned int i, j, n;
135         int pam_err;
136
137         memset(&script, 0, sizeof script);
138         pamc.conv = &t_pam_conv;
139         pamc.appdata_ptr = &script;
140         n = sizeof t_pam_return_cases / sizeof t_pam_return_cases[0];
141         for (i = 0; i < n; ++i) {
142                 tc = &t_pam_return_cases[i];
143                 tf = t_fopen(NULL);
144                 for (j = 0; j < 2; ++j) {
145                         t_fprintf(tf, "%s %s %s error=%s\n",
146                             pam_facility_name[tc->facility],
147                             pam_control_flag_name[tc->mod[j].ctlflag],
148                             pam_return_so,
149                             pam_err_name[tc->mod[j].modret]);
150                 }
151                 pam_err = pam_start(tf->name, "test", &pamc, &pamh);
152                 if (pam_err != PAM_SUCCESS) {
153                         t_printv("pam_start() returned %d\n", pam_err);
154                         t_fclose(tf);
155                         continue;
156                 }
157                 switch (tc->primitive) {
158                 case PAM_SM_AUTHENTICATE:
159                         pam_err = pam_authenticate(pamh, tc->flags);
160                         break;
161                 case PAM_SM_SETCRED:
162                         pam_err = pam_setcred(pamh, tc->flags);
163                         break;
164                 case PAM_SM_ACCT_MGMT:
165                         pam_err = pam_acct_mgmt(pamh, tc->flags);
166                         break;
167                 case PAM_SM_OPEN_SESSION:
168                         pam_err = pam_open_session(pamh, tc->flags);
169                         break;
170                 case PAM_SM_CLOSE_SESSION:
171                         pam_err = pam_close_session(pamh, tc->flags);
172                         break;
173                 case PAM_SM_CHAUTHTOK:
174                         pam_err = pam_chauthtok(pamh, tc->flags);
175                         break;
176                 }
177                 t_printv("%s returned %d\n",
178                     pam_func_name[tc->primitive], pam_err);
179                 pam_end(pamh, pam_err);
180                 t_printv("here\n");
181                 t_fclose(tf);
182         }
183         return (1);
184 }
185
186 \f
187 /***************************************************************************
188  * Boilerplate
189  */
190
191 static int
192 t_prepare(int argc, char *argv[])
193 {
194
195         (void)argc;
196         (void)argv;
197
198         if ((pam_return_so = getenv("PAM_RETURN_SO")) == NULL) {
199                 t_printv("define PAM_RETURN_SO before running these tests\n");
200                 return (0);
201         }
202
203         openpam_set_feature(OPENPAM_RESTRICT_MODULE_NAME, 0);
204         openpam_set_feature(OPENPAM_VERIFY_MODULE_FILE, 0);
205         openpam_set_feature(OPENPAM_RESTRICT_SERVICE_NAME, 0);
206         openpam_set_feature(OPENPAM_VERIFY_POLICY_FILE, 0);
207         openpam_set_feature(OPENPAM_FALLBACK_TO_OTHER, 0);
208
209         T(empty_policy);
210         T(mod_return);
211
212         return (0);
213 }
214
215 int
216 main(int argc, char *argv[])
217 {
218
219         t_main(t_prepare, NULL, argc, argv);
220 }